Watermarking graph partitioning solutions
暂无分享,去创建一个
[1] V. Rao,et al. New heuristics and lower bounds for graph partitioning , 1991, 1991., IEEE International Sympoisum on Circuits and Systems.
[2] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[3] Rupak Majumdar,et al. Watermarking of SAT using combinatorial isolation lemmas , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[4] Rafail Ostrovsky,et al. Minimum resource zero knowledge proofs , 1989, 30th Annual Symposium on Foundations of Computer Science.
[5] Arlindo L. Oliveira. Robust techniques for watermarking sequential circuit designs , 1999, DAC '99.
[6] Rajeev Motwani,et al. Randomized algorithms , 1996, CSUR.
[7] Brian W. Kernighan,et al. An efficient heuristic procedure for partitioning graphs , 1970, Bell Syst. Tech. J..
[8] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[9] Melvin A. Breuer,et al. A partitioning method for achieving maximal test concurrency in pseudo-exhaustive testing , 1991, Digest of Papers 1991 VLSI Test Symposium 'Chip-to-System Test Concerns for the 90's.
[10] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[11] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[12] Edward J. Delp,et al. A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[13] R. M. Mattheyses,et al. A Linear-Time Heuristic for Improving Network Partitions , 1982, 19th Design Automation Conference.
[14] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[15] Edward A. Lee,et al. The Extended Partitioning Problem: Hardware/Software Mapping, Scheduling, and Implementation-bin Selection , 1997, Des. Autom. Embed. Syst..
[16] F. Brglez,et al. Circuit partitioning for logic synthesis , 1991 .
[17] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[18] Miodrag Potkonjak,et al. Effective iterative techniques for fingerprinting design IP , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[19] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[20] Béla Bollobás,et al. Random Graphs , 1985 .
[21] David S. Johnson,et al. Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .
[22] Jason Cong,et al. Acyclic Multi-Way Partitioning of Boolean Networks , 1994, 31st Design Automation Conference.
[23] Miodrag Potkonjak,et al. Fingerprinting techniques for field-programmable gate arrayintellectual property protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[24] Miodrag Potkonjak,et al. Robust FPGA intellectual property protection through multiple small watermarks , 1999, DAC '99.
[25] Shashi Shekhar,et al. CCAM: A Connectivity-Clustered Access Method for Networks and Network Computations , 1997, IEEE Trans. Knowl. Data Eng..
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[28] Vipin Kumar,et al. A Fast and High Quality Multilevel Scheme for Partitioning Irregular Graphs , 1998, SIAM J. Sci. Comput..
[29] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[30] Michael Randolph Garey,et al. Johnson: "computers and intractability , 1979 .
[31] Miodrag Potkonjak,et al. Optimization-intensive watermarking techniques for decision problems , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[32] Ahmed H. Tewfik,et al. Data hiding for multimedia personalization, interaction, and protection , 1997 .
[33] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[34] Miodrag Potkonjak,et al. Intellectual Property Metering , 2001, Information Hiding.
[35] Giovanni De Micheli,et al. Partitioning of functional models of synchronous digital systems , 1990, 1990 IEEE International Conference on Computer-Aided Design. Digest of Technical Papers.
[36] Miodrag Potkonjak,et al. Techniques for intellectual property protection of DSP designs , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[37] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[38] Resve Saleh,et al. Automatic Partitioning And Dynamic Mixed-mode Simulation , 1992, 1992 Proceedings of the IEEE Custom Integrated Circuits Conference.
[39] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[40] Hugo De Man,et al. Partitioning-Based Allocation of Dedicated Data-Paths in the Architectural Synthesis for High Throughput Applications , 1991, Conference on Advanced Research in VLSI.
[41] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[42] Miodrag Potkonjak,et al. Watermarking while preserving the critical path , 2000, Proceedings 37th Design Automation Conference.
[43] Miodrag Potkonjak,et al. Robust IP watermarking methodologies for physical design , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[44] Jason Cong,et al. Intellectual property protection by watermarking combinational logic synthesis solutions , 1998, ICCAD '98.
[45] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[46] Miodrag Potkonjak,et al. Forensic engineering techniques for VLSI CAD tools , 2000, Proceedings 37th Design Automation Conference.
[47] Andrew B. Kahng,et al. Recent directions in netlist partitioning: a survey , 1995, Integr..
[48] Christian S. Collberg,et al. Software watermarking: models and dynamic embeddings , 1999, POPL '99.
[49] Frank Vahid,et al. Incremental hardware estimation during hardware/software functional partitioning , 1995, IEEE Trans. Very Large Scale Integr. Syst..
[50] Miodrag Potkonjak,et al. Watermarking techniques for intellectual property protection , 1998, Proceedings 1998 Design and Automation Conference. 35th DAC. (Cat. No.98CH36175).
[51] Miodrag Potkonjak,et al. Effective iterative techniques for fingerprinting design IP [VLSI CAD] , 1999, Proceedings 1999 Design Automation Conference (Cat. No. 99CH36361).
[52] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[53] Edoardo Charbon,et al. Watermarking-based copyright protection of sequential functions , 1999 .
[54] Miodrag Potkonjak,et al. Behavioral synthesis techniques for intellectual property protection , 2005, TODE.
[55] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[56] C.-C. Jay Kuo,et al. Blind digital watermarking for cartoon and map images , 1999, Electronic Imaging.
[57] Darko Kirovski,et al. Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.
[58] Richard J. Lipton,et al. A Revocable Backup System , 1996, USENIX Security Symposium.
[59] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[60] Andrew B. Kahng,et al. Multilevel circuit partitioning , 1997, DAC.
[61] Miodrag Potkonjak,et al. Fingerprinting intellectual property using constraint-addition , 2000, DAC.
[62] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[63] Miodrag Potkonjak,et al. Constraint-based watermarking techniques for design IP protection , 2001, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[64] Alberto L. Sangiovanni-Vincentelli,et al. Communication based logic partitioning , 1992, Proceedings EURO-DAC '92: European Design Automation Conference.